Verified Document

Computer Security Term Paper

Computer Security In the past few years, viruses like "I Love You" and "SoBig" have generated much publicity and apprehension and highlighted problems of computer security. In the last month alone, experts estimate that 52 new viruses have spread through computer networks. In addition, the growing incidence of identity theft also illustrates the growing sophistication of hackers and their tools.

This paper examines the main problems related to keeping the information on one's computer safe and secure. The first part of the paper looks at the main threats to computer security, both at home and in larger networks. These include hackers and infected files.

The next part then discusses the steps computer users need to take to protect themselves from such attacks, from simple steps such as periodically changing passwords to installing elaborate firewalls.

Types of Viruses

Breaches in computer security usually take the form of infected files. The most basic of these infected files is the "virus," a string of computer code programmed to replicate itself. Most viruses enter one's computer through e-mail attachments. However, viruses can also be spread through Web pages (Evarts).

Similar to the virus, the "trojan" often appears an e-mail attachment with a misleading title. Users unwittingly launch the trojan when they click on the attachment (Evarts). Often, the trojan also launches the computer's e-mail program, sending itself as an attachment to all the e-mail addresses in a user's address book.

The computer worm is more malicious than the simple virus. While a virus needs to be activated by a user, a worm can crawl in and out undetected while a computer is connected to the Internet. The most dangerous recent worms have already caused "denial of service attacks"...

Skilled hackers can break into a system and steal passwords, credit card numbers, social security numbers and other pertinent confidential information. This stolen information can then be used to steal a person's identity.
Protecting computer networks

Most experts agree, however, that taking simple precautions can prevent many virus and hacker attacks. The simplest precaution is to be careful in opening e-mail attachments. Many viruses and trojans replicate themselves through a computer address book. Therefore, users should not assume a file attachment is safe even if it comes from a familiar e-mail address (Seltzer 83).

Also, users are advised to change passwords constantly. Many people have the same password for a variety of sites, from Internet access to bill payment sites and online bank accounts, further facilitating identity theft. The most secure passwords have at least seven characters, with a mix of letters, numbers and symbols (Seltzer 83).

Computer users can also consult a variety of Web sites to keep abreast of the latest information on infected files. The McAfee web site, for example, provides up-to-date information regarding new viruses and a glossary of infected files and their effects. This site can be accessed at http://us.mcafee.com/virusInfo/default.asp?id=glossary.

Experts also stress the importance of a virus software program that is regularly updated, both among home and office users. This program should be installed on every computer in the network. Furthermore, computers running on the Windows 2000 and Windows XP platform should install the critical software…

Sources used in this document:
References

Evarts, Eric C. "Fighting off worms and other PC invaders." The Christian Science Monitor. September 22, 2003. ProQuest Database.

Seltzer, Larry. "10 Fast and Free Security Enhancements: Before You Spend a Dime on Security, There are Many Precautions..." PC Magazine. October 1, 2003: 83.

Wildstrom, Stephen H. "Fighting Viruses Begins at Home." Business Week. September 8, 2003: 18.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security
Words: 1378 Length: 4 Document Type: Term Paper

Security Assessment and Recommendations My Name My Teacher SE571 Principles of Information Security and Privacy TOC o "1-3" h z u AS Company Overview Two Security Vulnerabilities Software Vulnerability Recommended Solutions Telecommunications Closet Security Recommendation Impact on Business Processes Budget Aircraft Solutions (AS) is a globally recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Their manufacturing plants are located in San Diego, California and a second, in Santa

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Vulnerabilities Computer Security Vulnerabilities the Extent...
Words: 1375 Length: 5 Document Type: Research Paper

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Security Computer Security, Policy, and
Words: 802 Length: 3 Document Type: Essay

who have access to the network do not maintain proper security procedures and remain well-informed regarding potential risks and updated procedures and policies (Cobb, 2011; Whitman & Mattord, 2011; ICR, 2008). Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who

Computer Security Information in the 21st Century,
Words: 599 Length: 2 Document Type: Essay

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now